<u>Output:</u>
f1 in A
f2 in A
f1 in B
f2 in A
f1 in A
f2 in A
f1 in B
f2 in B
<u>Explanation:</u>
In this snippet, the code makes use of virtual functions. A virtual function is defined as a function that is defined in the base class and redefined in the derived class. If the derived function accesses the virtual function, the program will get executed with the derived class’s version of the function.
In this code, we define the virtual function f1() in class A and also redefine it in class B which is the derived class of A. While executing the program, the function g which takes the object b (class B’s object) as a parameter. It will print class B’s version of f1() rather than class A’s version. This is working off the virtual function.
Answer:
We Deliver trains its truck loaders how to set the packages in the delivery vehicles, so that when delivery drivers are pulling packages off their trucks, they are organized in a specific order and with the label facing forward to reduce errors and save time. A <u>Procedure </u>is being implemented when directing that the trucks be loaded in this specific manner.
Explanation:
Procedure is the method or set of instructions to perform some operation in specific order to complete the task in an organized manner. It is the type of directions to perform some operations.
In above mentioned case, if we want that the packages should set in some organized manner such as labeling face of package in forward direction so that, chance of error should reduce and time save. We should provide some procedure to the truck loaders.
Answer:
Structured Documents
Explanation:
Structured Documents consist of hierarchy in the files. They may include data files. HTML (Hyper-text markup language) documents and XML (Extensible Markup Language) applications are the examples of Structured Documents.
The question is incomplete as the scenarios are not given that were to be matched by the given encryption algorithms.
By finding the question from internet i have attached the image of the scenarios in the form of table and answered below accordingly
<h2>
Answer:</h2>
<u>Scenario A:</u>
Advanced Encryption Standard (AES) is a technique that uses 256-bit cipher texts for encryption process. The data encrypted by AES cannot be attacked and even it cannot be decrypted unless a brute-force search is used through all of possible 256-bit keys.For mobile security it is known as one of the best algorithms.
<u>Scenario B:</u>
Following are the techniques of encryption used for given scenario:
- ECC
- Digital Signature
- AES
- Blowfish
<u>Scenario C:</u>
Following are the techniques of encryption used for given scenario:
<u>Scenario D:</u>
Secure Sockets Layer (SSL) - SSL is a protocol that is commonly-used for managment of the message transmission security over the Internet)
<u>Scenario E:</u>
Advanced Encryption Standard (AES) - AES is an encryption algorithm used by U.S. Government agencies for securing sensitive but unclassified material .
i hope it will help you!
Define variables
left is l
right is r
Ask input
left or right
Ask input value
Equate l or r to the input value
Show ladder with steps equal to input value and in the side of input variable